You are on page 1of 9

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 2, Issue 5, September October 2013 ISSN 2278-6856

Cloud Computing: Research Activities and Challenges


Chetan M Bulla1, Satish S Bhojannavar2 and Vishal M Danawade3
Dept. of CSE, KLEs KLECET, Chikkodi, Karnataka, India Dept. of ISE, KLEs KLECET, Chikkodi, Karnataka, India
2,3 1

Abstract: Cloud computing is a new computing paradigm,


which was started in 2007 and it is one of the hottest topic in field of IT industry. Cloud computing is based on several other computing research areas such as SOA, virtualization, utility computing and grid computing. Cloud computing is a type of computing that relies on sharing computing resources like memory, processors, database and applications. Cloud computing becoming popular because its ease of use and providing variety of services. In this paper we will survey research activities and challenges in cloud computing environment.

physical server to another. On demand self services: The computer services such as email, applications, network or server service can be provided without requiring human interaction with each service provider. Broad network access: Cloud capabilities are available over the network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms such as mobile phones, laptops and PDAs. Resource pooling: The providers computing resources are pooled together to serve multiple consumers using multiple-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand. The resources include among others storage, processing, memory, network bandwidth, virtual machines and email services. The pooling together of the resource builds economies of scale. Rapid elasticity: Cloud services can be rapidly and elastically provisioned, in some cases automatically, to quickly scale out and rapidly released to quickly scale in [13]. Pay-as-you-go: Cloud computing resource usage can be measured, controlled, and reported providing transparency for both the provider and consumer of the utilized service [3]. Cloud computing services use a metering capability which enables to control and optimize resource use. Reduced Cost: a report by the Brookings Institution finds government agencies can save 25% to 50% of their IT costs and increase their business agility by migrating IT infrastructure to cloud services.

Keywords: cloud computing, research activities, research challenges, and virtualization

1. INTRODUCTION
Cloud computing is a type of computing that relies on sharing computing resources like memory, processors and applications. Cloud computing is Internet based computing, where storage, processing and application are delivered to requested user or organization through the Internet. Instead of keeping data on own hard drive or updating applications for the needs, we use a service over the Internet, to store information or use its applications [1]. Cloud computing entrusts remote services with a user's data, software and computation [3] [5]. End users can access cloud-based applications through a web browser or a light-weight desktop or mobile app while the software and user data are stored on servers at remote locations. The remainder of this paper is organized as follows. Section 2 describes the characteristics of Cloud computing, Section 3, the types of Clouds, Section 4, the service models and challenges and Section 5 describes research activities and challenges in cloud environment.

2. Characteristics
Agility: Agility means the ability to respond faster to changing business needs with IT services and support. Cloud computing provides services faster and secure [6]. Agility improves with users' ability to re-provision technological infrastructure resources. Virtualization: It is an emerging IT paradigm that separates functions and technology implementations from physical hardware. Virtualization allows servers and storage devices to be shared and utilization be increased [2] [8]. Applications can be easily migrated from one Volume 2, Issue 5 September October 2013

Figure 1 Cloud computing Environment Page 206

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)


Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 2, Issue 5, September October 2013 ISSN 2278-6856
Multi Tenacity: It refers to the need for policy-driven enforcement, segmentation, isolation, governance, service levels, and chargeback/billing models for different consumer constituencies. Consumers might utilize a public cloud providers service offerings or actually be from the same organization, such as different business units rather than distinct organizational entities, but would still share infrastructure [14]. with other organizations, whether managed internally or by a third-party. It can be hosted internally or externally [28]. There are two variations of private clouds: On-Premise Private Cloud: This type of cloud is hosted within an organizations own facility. These Clouds are best used for applications that require complete control and configurability of the infrastructure and security. Externally Hosted Private Cloud: Externally hosted private clouds are exclusively used by one organization, but are hosted by a third party specializing in cloud infrastructure. The service provider facilitates an exclusive cloud environment with full guarantee of privacy. A public cloud is the obvious choice when: You need data sovereignty but want cloud efficiencies. You want consistency across services. You have more server capacity than your organization can use. Your data center must become more efficient. You want to provide private cloud services. 3.3 Community Cloud Community cloud is a is a multi-tenant cloud service model that is shared among several or organizations and that is governed, managed and secured commonly by all the participating organizations or a third party managed service provider. The goal of community clouds is to have participating organizations realize the benefits of a public cloud with the added level of privacy, security, and policy compliance usually associated with a private cloud. Here are a couple of situations where a community cloud environment is best: Government organizations within a state that need to share resources. A private HIPAA (Health Insurance Portability and Accountability Act) compliant cloud for a group of hospitals or clinics Telco community cloud for Telco doctors to meet specific FCC regulations Cloud computing is about shared IT infrastructure or the outsourcing of a company's technology. It is essential to examine your current IT infrastructure, usage and needs to determine which type of cloud computing can help you best achieve your goals. Simply, the cloud is not one concrete term, but rather a metaphor for a global network and how to best utilize its advantages depends on your individual cloud focus. 3.4 Hybrid Clouds Hybrid clouds are a composition of two or more clouds (private, community or public) that remain unique entities but are bound together offering the advantages of multiple deployment models. Augmenting a traditional private cloud with the resources of a public cloud can be used to manage any unexpected surges in workload. Hybrid cloud architecture requires both on-premise resources and offsite server based cloud infrastructure [28]. By spreading things out over a hybrid cloud, you keep each aspect of Page 207

3. TYPES OF CLOUDS
With cloud computing technology, large pools of resources can be connected through private or public networks [29]. Businesses can choose to deploy applications either on Public, Private, Community or Hybrid clouds. 3.1 Public Clouds Public clouds are made available to the general public by a service provider who hosts the cloud infrastructure. Amazon AWS, Microsoft and Google are public cloud provider. They operate the infrastructure and offer access over the Internet. With this model, customers have no visibility or control over where the infrastructure is located. It is important to note that all customers on public clouds share the same infrastructure pool with limited configuration, security protections and availability variances. Public cloud customers benefit from economies of scale, because infrastructure costs are spread across all users, allowing each individual client to operate on a low-cost, pay-as-you-go model. Another advantage of public cloud infrastructures is that they are typically larger in scale than an in-house enterprise cloud, which provides clients with seamless, on-demand scalability. A public cloud is the obvious choice when: Your standardized workload for applications is used by lots of people, such as e-mail.

Figure 2 Types of Clouds You need to test and develop application code. You need incremental capacity (the ability to add compute resources for peak times). You are doing collaboration projects. 3.2 Private Clouds Private cloud is cloud infrastructure dedicated to a particular organization. Private clouds allow businesses to host applications in the cloud, while addressing concerns regarding data security and control, which is often lacking in a public cloud environment. It is not shared Volume 2, Issue 5 September October 2013

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)


Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 2, Issue 5, September October 2013 ISSN 2278-6856
your business in the most efficient environment possible. A public cloud is the obvious choice when: Your company wants to use a SaaS application but is concerned about security. Your company offers services that are tailored for different vertical markets. You can use a public cloud to interact with the clients but keep their data secured within a private cloud. You can provide public cloud to your customers while using a private cloud for internal IT. forecasting and automated business processes where real time data and functionality sharing is needed. Some SaaS providers have responded to the integration challenge by developing application programming interfaces (APIs). Unfortunately, accessing and managing data via an API requires coding and maintenance due to API modifications and updates. API have also some limitations. Another challenge is related to a data locality. In a SaaS consumers use the applications to process their business data. The problem is that the customer does not know where the data is getting stored. Due to compliance and data privacy laws in various countries, locality of data is very important in part of the enterprise architecture. 4.2 Platform as a Service (PaaS) The difference between SaaS and PaaS is that SaaS only hosts completed cloud applications where PaaS offers a development platform for both completed and in-progress cloud applications [28]. PaaS offers an environment where developers can create and deploy applications and do not necessarily need to know how much memory or how many processors their application will be using. In addition multiple programming models and specialized services (data access, authentication, etc) can be offered as a building block to new applications [29]. PaaS model provides developers a service that can be used to a complete software development lifecycle management, from planning to design to building applications to deployment to testing to maintenance [30]. Table 2 summarizes popular PaaS service provider. Table 2. Popular PaaS providers

4. SERVICE MODELS
4.1 Software as a Service (SaaS) The most known and the leading service model of more widespread adoption of cloud computing has been the SaaS. In SaaS model a software provider licenses a software application to be used and purchased on demand. Applications can be accessed through networks from various clients (web browser, mobile phone, etc.) by application users. The application requires no client installation, just a browser or other client device and network connectivity. SaaS offerings can be classified by the software and the pricing model. Table 1 gives an overview of some SaaS providers. The most common pricing model is pay per use, which a customer pays a static price for units they use. Another pricing model is subscription, which a customer subscribes to use a preselected combination of service units for a fixed price and a longer time frame, monthly or yearly. Table 1. Popular SaaS Provider. Provider Salesforce Google Gmail Process Maker Live XDrive OpSource Appian Anywhere Box.net MuxCLoud Software CRM Email Business process management Storage Billing Business process management Storage Data processing Pricing model Pay per use Free Pay per use Subscription Subscription Pay per use Pay per use Pay per use

4.1.1 Challenges Like any new technology, SaaS model suffers some of limitations. One of the major challenges with SaaS applications is integration [11]. SaaS applications typically provide services for one business area like Enterprise resource planning (ERP). As a result companies are facing serious problems with accurate data, Volume 2, Issue 5 September October 2013

4.2.1 Challenges Cloud data stores provide scalability and high availability properties for web applications but do not support complex queries such as joins. Developers must therefore Page 208

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)


Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 2, Issue 5, September October 2013 ISSN 2278-6856
design their programs according to the peculiarities of NoSQL data stores rather than established software engineering practice. In PaaS model the provider gives some control to the developers to build applications on top of the platform. But any security below the application level such as host and network intrusion prevention will still be in the scope of the provider [9]. The provider needs to verify that the data remains inaccessible between applications. PaaS model offers developers a service that provides a complete software development lifecycle management. Everything else is abstracted away from the eyes of the developers [28]. 4.3 Infrastructure as a Service (IaaS) The infrastructure layer focuses on enabling technologies [8]. IaaS model changes the way developers deploy their applications. Instead of spending time with their own data centers or managed hosting companies, they can just select one of the IaaS provider, get a virtual server running in few minutes and pay only for the resources they use [34]. From a technology viewpoint the IaaS type of cloud offerings have been the most successful [40]. 4.3.1 Challenges Out of the box IaaS usually only provides basic security (perimeter firewall, load balancing, etc.) and applications moving into the cloud will need higher levels of security provided at the host [29]. Security responsibilities of both the provider and the consumer differ between different service providers. Amazons Elastic Compute Cloud (EC2) includes vendor responsibility for security up to the hypervisor, meaning they can only address security controls such as physical security, environmental security, and virtualization security. The consumer is responsible for the security controls that relate to the IT system including the OS, applications and data [32]. To be able to improve availability and responsiveness, an IaaS provider builds several data centers distributed around the world. For example, Amazon Web Services calls these data centers as availability zones and regions. Currently Amazon is having availability zones in US and in Europe. Table 3: Feature comparison of IaaS providers Different types of user interfaces provide different levels of abstraction, the most common being graphical user interfaces (GUI), command-line tools (CLI), and Web service (WS) APIs [29]. Usually IaaS providers offer multiple user interfaces.

5. RESEARCH ACTIVITIES AND CHALLENGES.


5.1. Virtualization Most discussions on cloud computing typically begin with virtualization. Basic idea of a virtualization is that the resources of one physical computer can be portioned into logical resources and rearranged into multiple virtual machines [17]. The operating system, network and storage resources can be virtualized to improve the performance. Virtualization is critical to cloud computing because it simplifies the delivery of services by providing a platform for optimizing complex IT resources in a scalable manner, which makes cloud computing so cost effective. Virtualization is emerging IT paradigm that separates computing tasks and technology implementation from physical hardware [12]. Virtualization has three characteristics that make it ideal for cloud computing: 1. Partitioning: Partitioning supports many applications and operating systems (OSs) in a single physical system. 2. Isolation: Each machine is protected from crashes and viruses in the other machines. 3. Encapsulation: Protect each application so that it doesnt interfere with other applications. Using encapsulation, a virtual machine can be represented as a single file, making it easy to identify and present to other applications. 5.1.1 Research activities Virtualization is the most emerging technology of this decade in which the advancement is taking place exponentially. Most of the organizations are now aware of the advantages of adopting virtualization and thus are deploying virtualization solutions in order to reduce the downtime and to make efficient utilization of power [33]. Virtualization technology usage is increasing day by day and so is the risk associated with it. There are many security loop holes in this technology which if compromised, can prove to be very expensive in future. 5.1.2 Challenges There are some challenges facing by cloud computing: 1. Depleted resources: Often created by a move from physical hardware to virtual hardware and VM saturation cause application networking resources to be depleted at a much faster rate. I/O intensive operations get bogged down in the virtualization translation layer.

Volume 2, Issue 5 September October 2013

Page 209

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)


Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 2, Issue 5, September October 2013 ISSN 2278-6856
Saturation of the network card and software switch on the physical host causes performance issues, reduced bandwidth, and increased latency. 2. Lack of awareness: Virtual infrastructure platforms include software that can migrate running VM instances from one physical device, which often causes a lapse in application availability [32]. When VMwares Distributed Resource Scheduler (DRS) moves an image to a different physical box, the app is unavailable during the migration, interrupting the customers persistence as well as shopping cart transactions. Bringing up new virtual images is easy, and so is bypassing typical work ows and congurations as a result. As VMs proliferate, IP addresses are lost, images are assigned to the wrong VLAN and availability is negatively impacted. 3. Additional, unanticipated costs: Additional costs often result from implementing OS virtualization. New hardware and software licenses can be required to solve problems with availability, performance, and management. As VMs burden existing infrastructure, requirements grow for application and storage networks. Management of new tools requires increased headcount and training. VM sprawl creates orphaned virtual disk images that take up critical storage space 4. Non-virtualization: New virtual platforms include many advanced networking technologies, such as software switching and support for VLAN segmentation. However these features are localized and isolated to the VM platforms. They are not integrated with the rest of the Application Delivery Network (ADN) because there is no sharing of information between VMware and the network. Storage integration issues arise as soon as VMs are moved into production as additional storage virtualization tools are needed to migrate live machine outside the local storage domain. Overrun storage network: OS and data les that typically reside on internal storage in physical server environments are moved to share storage in virtual environments. OS drives are converted to at-le virtual machine disks (VMDKs), which take up 10100s of GBs each of networked storage. Storing gold virtual images to be cloned as needed and copied to another part of the storage network creates a proliferation of rarely used parked images on shared storage, adding unnecessary costs. 5. Congested storage network: Data pipes cant handle the volume OS virtualization can dramatically increase data storage traffic, and passing large amounts of data from multiple guests through one host storage network Volume 2, Issue 5 September October 2013 connection, such as NFS, can cause instant bottlenecks, ooding and congestion. Moving large virtual disk images outside the LAN causes extensive delays. Unplanned VM migrations resulting from VM sprawl bring the network to a standstill. 6. Management complexity: Managing VMs as part of the complete management solution can be a struggle. This includes managing the VMs themselves as well as managing all parts of the data center as one delivery unit. The hypervisor and the host system are two new components that are not part of existing data center management solutions. It is important to be able to manage these devices and understand their impact on performance. Built-in management tools for VM platforms only manage the virtual resources and do not take into account any external information 5.2. Cloud Aggregation Two key technological challenges for cloud are, supporting the expansion of the distributed services across different IaaS providers and enabling the portability of such services. These challenges require research on developing novel architectural architectures and brokering mechanisms for high availability, improving performance, effective resource utilization, reduce price and defining standards for cloud interoperability and portability [15]. Current IaaS cloud technologies support two main aggregation architectures: cloud-bursting and cloudbrokering models. The cloud-bursting architecture (also known as the hybrid cloud), combines existing, onpremise cloud infrastructures with remote resources from one or more public clouds to provide extra capacity and satisfy peak demand periods. 5.2.1 Research Activities One open research line is to develop novel aggregation architectures that allow a higher degree of coupling in which a provider could : Have advanced control over remote resources. Access detailed monitoring information about remote resources; and Implement some advanced cross-site features. 5.2.2 Challenges 1. Service Portability between different cloud service providers involves several challenges due to a dearth of standard interfaces for interacting with different clouds and standard interfaces and formats for managing virtual appliances [24]. Currently, no standard interface exists for interfacing with a cloud, and each provider exposes its own APIs.

Page 210

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)


Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 2, Issue 5, September October 2013 ISSN 2278-6856
2. Clearly, cloud providers must unify their different cloud APIs and adopt a standardized cloud interface. In this context, several efforts are under way, such as 1. The Open Cloud Computing Interface (OCCI), which defines a protocol and API specification for remotely managing cloud computing infrastructures; 2. The Cloud Infrastructure Management Interface (CIMI), a work-in-progress standard that defines an interface and a logical model for managing resources within an IaaS cloud. 3. Important snag for users who is moving their services from one cloud to another is a lack of compatibility in image-packaging formats and image-management interfaces. Some standardization efforts also exist in this area, such as the Open Virtualization Format (OVF), which defines a standard for packaging and distributing virtual appliances. 4. Another obstacle for cloud service provider is to share the resources. There is no standardization for resource sharing in cloud. A lot of research work can be taken to develop standardization for sharing resources between clouds. 5.3 Cloud Migration The process of transitioning all or part of a companys data, applications and services from on-site premises behind the firewall to the cloud, where the information can be provided over the Internet on an on-demand basis [8]. While a cloud migration can present numerous challenges and raise security concerns, cloud computing can also enable a company to potentially reduce capital expenditures and operating costs while also benefiting from the dynamic scaling, high availability, multitenancy and effective resource allocation advantages cloud-based computing offers. 5.3.1 Research Activities The research focuses for instance on an advanced modeldriven methodology and tools for reuse and migration of on-premises applications to cloud [24]. To support the migration, e.g. the REMICS project (EU FP7) [41] enhances the Object Management Groups (OMG) Architecture Driven Modernization (ADM) methodology with specific methods, meta-models and tool support, including knowledge discovery, patterns and transformations for SOA and cloud computing. 5.3.2 Challenges 1. The cloud managers face extreme problems at the time of data migration from a companys server to a server that forms cloud elsewhere. The cloud behaves as an interface through which organizations can access data in a virtual environment [31]. Thus, smooth functioning of it depends primarily on how well groomed and knowledgeable cloud providers are in this area. Volume 2, Issue 5 September October 2013 2. The improper and unprofessional working force makes difficulties in cloud. Advanced equipments comprising of software and hardware tools might be good sources for managing cloud of an organization or migrating it, but lack of knowledge about them and insufficient skill set for their implementation and installation may prove all the efforts of cloud providers in vain. 3. Moreover, if data migration is not done systematically and properly, it can give rise to problems concerning data and cloud security of companys assets that primarily comprise of data. Thus, hiring cloud providers having sound experience about the field with ample knowledge and skill sets becomes vital for managing cloud more effectively and efficiently. 4. Governing confidential data is not a simple task. Reputed managed cloud providers do it with utmost care and priority. However, despite equipped with highend tools for installing and incorporating data the cloud management professionals also need to take care that whatever data they are storing in the cloud is well protected and safeguarded from outside thefts and fallacies. As Internet is housing ground for criminal acts, services such as cloud management needs special attention in order to remain protected. 5.4. Cloud Elasticity Elasticity in the cloud is the ability of an application to automatically adjust the infrastructure resources it uses to accommodate varied workloads and priorities, while maintaining availability and performance in a contextaware environment [15]. There are other important scalable entities in the cloud such as networks, databases and important middleware and monitoring tools. The main obstacle to utilizing elasticity is that most enterprise-application architectures are not designed to take advantage of the elastic infrastructure resources currently inherent to cloud IaaS platforms [31]. 5.4.1 Research activities Cloud infrastructures employ virtual infrastructure (VI) management to dynamically orchestrate the deployment of virtual machines, management of storage requirements, and to configure resources to adapt to an organizations changing needs. 5.4.2 Challenges Elastic services offer additional management challenges. 1. The components and resources involved in an elastic service are dynamic and change as demand for the service changes. This means that the management system must be able to automatically adapt to the changes in the underlying set of managed resources. It is also more difficult for a services management system to ensure predictable performance from the service and to support problem determination since the underlying resource configuration changes. Page 211

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)


Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 2, Issue 5, September October 2013 ISSN 2278-6856
2. Adding or removing resources, such as a virtual machine, to a service can involve significant delays. The services management system must be able to predict when a change in the makeup of the service will be necessary with enough lead time to minimize the impact of the change. 5.5 Cloud Interoperability The ability of applications to move from one cloud environment to the next and for the applications to work exactly the same in both places Cloud interoperability refers to the ease of migration and integration of applications and data between different providers clouds [8]. 5.5.1 Research activities The requirement of interoperability is mostly addressed with regard to specific dimensions, indicating that there is still room for a more holistic approach with the regard to the issue at hand. The solutions focus on providers that use the same technology, denoting that there is a long way ahead until global interoperability across the cloud is achieved. The business value of mashing up applications to develop interoperable cloud services, tailored to different users have to be further highlighted and promoted within research endeavors. 5.5.2 Challenges 1. How applications and services can be combined, while maintaining some level of resiliency with regards to changes in connectivity and location. 2. The APIs that a management application can use to control multiple cloud environments. This explores how images are delivered between providers; how servers/applications are started or stopped; and how storage can be manipulated. 3. A single sign-on for users who access multiple cloud platforms, enabling a service hosted on one platform to automatically call a service hosted by another, and having a private cloud application seamlessly obtain resources from a public cloud when necessary [24]. 5.6. Security and Privacy Cloud computing set up a area of opportunities for businesses, but mixed in with these opportunities are numerous security challenges that need to be considered and addressed prior to committing to a cloud computing strategy [9] [10]. 5.6.1 Research activities Many security and privacy incidents are also observed in todays cloud computing systems. The thousands of research works is undergone and still not getting complete solution because its market based and market is always varying. So need good research work is needed. Volume 2, Issue 5 September October 2013 5.6.2 Challenges Cloud computing security challenges: 1. Protection: Securing your data both at rest and in transit 2. Authentication: Limiting access to data and monitoring who accesses the data 3. Access Control and Accounting: access control services should be flexible enough to capture dynamic, context, or attribute- or credential-based access requirements and to enforce the principle of least privilege 4. Trust Management and Policy Integration: Cloud service providers need to combine multiple services to enable biggest application services. Therefore, mechanisms are necessary to ensure that such dynamic and huge application collaboration is handled securely and that security breaches are effectively monitored during the interoperation process [27]. 5. Secure-Service Management: The cloud issues such as quality of service, price, and SLAs are critical in service search and composition. These issues must be addressed to describe services and introduce their features, find the best interoperable options, integrate them without violating the service owners policies, and ensure that SLAs are satisfied. 6. Privacy and Data Protection: Cloud service providers must assure their customers and provide a high degree of transparency into their operations and privacy assurance. 5.7. Resource management Resource management involves resource scheduling, dynamic resource allocation, resource mapping, resource provisioning and load balancing [34]. 5.7.1 Research Activities There is plenty of work undergone on above areas. The load balancing is achieved through some sort of load balancing among the participating nodes. There are some metrics that will help to evaluate the efficiency of each load balancing method. Load balancing techniques in cloud environment, consider various parameters like performance, scalability, response time, throughput, resource utilization, fault tolerance, migration time and associated overhead time, throughput, resource utilization, fault tolerance, migration time and associated overhead. 5.7.2 Challenges There are lot of work is undergoing with resource management, but we are taking main challenges of resource management. The main challenges faced by cloud computing are: 1. Dynamic allocation: The resources are allocated dynamically on the arrival of workloads according to its requirements. It is complex task because dynamic Page 212

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)


Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 2, Issue 5, September October 2013 ISSN 2278-6856
resource allocation involves resource selection, mapping of appropriate resources [5]. 2. Workload prediction: Predicting the workload is one of main challenging task in cloud computing because its difficult to predict future load of the cloud. To predict the workload, first we classify the workloads into homogeneous, heterogeneous workload and then apply either statistical analysis or neural network for load prediction. [10] Cloud Security Alliance. Security guidance for critical areas of focus in cloud computing (v2.1). Decemeber, 2009. [11] D. Catteddu and G. Hogben, Cloud Computing: Benefits, Risks and Recommendations for Information Security, ENISA, 2009. [12] Paul Hofmann, Dan Woods, "Cloud Computing: The Limits of Public Clouds for Business Applications",IEEE,1089-7801/10 2010. [13] Philip Dawson, Amit Singh, Virtualization Key Initiative Overview, http://www.gartner.com/it/initiatives/pdf/KeyInitiati ve Overview_Virtualization.pdf, 2010. [14] Hugos, M., and Hulitzky, D., Business in the cloud: what every business needs to know about cloud computing, Wiley, 2010. [15] Dillon T., Chen W., and Chang, E., Cloud Computing: Issues and Challenges, Proc 24th IEEE International Conference on Advanced Information Networking and Applications (AINA), Perth, Australia, April 2010. [16] Subashini S., and Kavitha V., A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, July 2010. [17] Anandasivam A., Blau B., Stosser, J., and Weinhardt C., Business Models in the Service World, IT Professional, September/October,2010. [18] Jinzhu Kong, A Practical Approach to Improve the Data Privacy of Virtual Machines 2010 IEEE 10th International Conference on Computer and Information Technology (CIT), pp. 936-941 June 29 -July 1 ,2010. [19] Pearson, S. and Azzedine Benameur, Privacy, Security and Trust Issues Arising from Cloud Computing in 2010 IEEE Second International Conference Cloud Computing Technology and Science (CloudCom), page(s): 693-702,Nov 30-Dec 3,2010 [20] Esteves, R.M. and Chunming Rong, Social Impact of Privacy in Cloud Computing in 2010 IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom), pp. 593-596,N ov. 30-Dec. 3 ,2010. [21] Hassan T, James B.D.Joshi, Gail-Joon, "A Security and Privacy Challenges in Cloud Computing Environments", COPUBLISHED BY THE IEEE COMPUTER AND RELIABILITY SOCIETIES,1540-7993/10/$26.00 2010. [22] Grance T., and Mell P., NIST definition of cloud computing, National Institute of Standards and Technology, January 2011. [23] L.Arockiam, S.Monikandan, G.Parthasarathy, "Cloud Computing: A Survey",(IJIC), ISSN No: 2231 6965, Volume-1, Issue-2, 2011. [24] V.Krishna Reddy, B.Thirumala Rao,Dr.L.S.S. Reddy, P. Sai Kiran, "Research Issues in Cloud Page 213

6. CONCLUSION
Cloud computing is a developing computing technology that uses the Internet and multiple remote servers to maintain data and software applications. We have identied the characteristics, service models along with the challenges. We have also identified research activities related to various technologies used in cloud computing environment. According to the challenges noted above, lot of research work can do in different areas to overcome these challenges and potential users need to evaluate QoS and security measures such as firewalls, and encryption technique and make sure that they will have access to data and software.

References
[1] Broberg J., Buyya, R., and Goscinski A., Cloud Computing: Principles and Paradigms, Wiley Press, USA, 2011. [2] Mark F. Mergen, Volkmar Uhlig, Orran Krieger, Jimi Xenidis, "Virtualization for High-Performance Computing", IBM T. J. Watson Research Center Yorktown Heights, 2007. [3] Greg Goth, "Software-as-a-Service: The Spark That Will Change Software Engineering? , IEEE, vol. 9, no. 7, 1541-4922 2008. [4] Bechtolsheim, A. Cloud Computing and Cloud Networking. talk at UC Berkeley, December 2008. [5] N.M. Mosharaf, Kabir Chowdhury, "Identity Management and Resource Allocation in the Network Virtualization Environment", Waterloo, Ontario, Canada, 2008. [6] Foster I, Zhao Y, Raicu I, "Cloud Computing and Grid Computing 360-Degree Compared", IEEE, 2008 [7] RightScale (2008) Define Cloud Computing. RightScale Blog, 26 May 2008. http://blog.rightscale.com/2008/05/26/define-cloudcomputing/,2008 [8] Amit Goyal and Sara D., "A Survey on Cloud Computing" University of British Columbia, Technical Report for CS 508, December 2009. [9] N. M. Mosharaf Kabir Chowdhury and Raouf Boutaba, "Network Virtualization: State of the Art and Research Challenges", IEEE, 0163-6804 2009.

Volume 2, Issue 5 September October 2013

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)


Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 2, Issue 5, September October 2013 ISSN 2278-6856
Computing", GJCST, Volume 11, Issue 11, Version 1.0, July 2011. Patrick Martin, Andrew Brown, Wendy Powley, Jose Luis Vazquez-Poletti, "Autonomic Management of Elastic Services in the Cloud", IEEE, 978-1-4577-0681-3/11/$26.00 2011. Google AppEngine, http://code.google.com/intl/fiFI/appengine/. [10.2.2012]. Pradeep Kumar Tiwari1, Dr. Bharat Mishra2, "Cloud Computing Security Issues, Challenges and Solution",ijetae, ISSN 2250-2459, Volume 2, Issue 8, August 2012. Eeva Savolainen, "Cloud Service Models" Seminar Cloud Computing and Web Services, UNIVERSITY OF HELSINKI, Department of Computer Science, Helsinki 10.2.1012. Amazon Web Services, http://aws.amazon.com/. [9.2.2012]. Claus Pahl, Huanhuan Xiong, Ray Walshe, "A Comparison of On-premise to Cloud Migration Approaches", IJSCT, 2 (2), 278-286,2012. Amazon. Amazon Elastic Compute Cloud (Amazon EC2).http://aws.amazon.com/ec2/. "Advanced Network Virtualization: Definition, Benefits, Applications, and Technical Challenges", Network Virtualization Study Group (NVSG) White Paper,v1.0, 2012. Patidar, S. Rane, D, Jain, P,"A Survey Paper on Cloud Computing", Advanced Computing & Communication Technologies (ACCT), 2012 Second International Conference, IEEE, P.394 398, 2012 Alexandre Kandalintsev, Trento, Italy, "Advanced Cloud Resource Management For Performance and Power Saving",2012. Jyotiprakash Sahoo, Subasish Mohapatra, Radha Lath, 2010, Virtualization: A Survey On Concepts, Taxonomy And Associated Security Issues, 2nd International Conference on Computer and Network Technology, IEEE,2012. Understanding Cloud Security Challenges, cognizant 20-20 insights , nov 2012. Pooja Kedia, Renuka Nagpal, Tejinder Pal Singh, "A Survey on Virtualization Service Providers, Security Issues, Tools and Future Trends", IJCA(0975 8887),Volume 69 No.24, May 2013 Vikas Kumar, "Survey Paper on Cloud Computing", IJEAT, ISSN: 2249 8958, Volume-2, Issue-6, August 2013. Arto Ojala, "Software-as-a-Service Revenue Models",IEEE,1520-9202/13/$31.00 2013. K. Rasmi and V. Vivek, "Resource Management Techniques in Cloud Environment - A Brief Survey", IJIAS, ISSN 2028-9324 Vol. 2 No. 4 Apr. 2013, pp. 525-532, 2013. REMICS Project: http://cordis.europa.eu/fp7/ict/ssai. Page 214

[25]

[26] [27]

[28]

[29] [30]

[31] [32]

[33]

[34]

[35]

[36] [37]

[38]

[39] [40]

[41]

Volume 2, Issue 5 September October 2013

You might also like